Message ID | 20240523094617.141148-1-honggangli@163.com (mailing list archive) |
---|---|
State | Accepted |
Headers | show |
Series | RDMA/rxe: Fix responder length checking for UD request packets | expand |
On 23.05.24 11:46, Honggang LI wrote: > According to the IBA specification: > If a UD request packet is detected with an invalid length, the request > shall be an invalid request and it shall be silently dropped by > the responder. The responder then waits for a new request packet. > > commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking") > defers responder length check for UD QPs in function `copy_data`. > But it introduces a regression issue for UD QPs. > > When the packet size is too large to fit in the receive buffer. > `copy_data` will return error code -EINVAL. Then `send_data_in` > will return RESPST_ERR_MALFORMED_WQE. UD QP will transfer into > ERROR state. > > Fixes: 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking") > Signed-off-by: Honggang LI <honggangli@163.com> > --- > drivers/infiniband/sw/rxe/rxe_resp.c | 12 ++++++++++++ > 1 file changed, 12 insertions(+) > > diff --git a/drivers/infiniband/sw/rxe/rxe_resp.c b/drivers/infiniband/sw/rxe/rxe_resp.c > index 963382f625d7..a74f29dcfdc9 100644 > --- a/drivers/infiniband/sw/rxe/rxe_resp.c > +++ b/drivers/infiniband/sw/rxe/rxe_resp.c > @@ -354,6 +354,18 @@ static enum resp_states rxe_resp_check_length(struct rxe_qp *qp, > * receive buffer later. For rmda operations additional > * length checks are performed in check_rkey. > */ > + if ((qp_type(qp) == IB_QPT_GSI) || (qp_type(qp) == IB_QPT_UD)) { From IBA specification: " QP1, used for the General Services Interface (GSI). •This QP uses the Unreliable Datagram transport service. •All traffic to and from this QP uses any VL other than VL15. •GSI packets arriving before the current packet’s command completes may be dropped (i.e. the minimum queue depth of QP1 is one). " GSI should be MAD packets. And it should have a fixed format. Not sure if the payload of GSI packets will exceed the size of the recv buffer. Except the above, I am fine with this commit. Please Jason and Leon also comment on it. Reviewed-by: Zhu Yanjun <yanjun.zhu@linux.dev> Thanks, Zhu Yanjun > + unsigned int recv_buffer_len = 0; > + unsigned int payload = payload_size(pkt); > + > + for (int i = 0; i < qp->resp.wqe->dma.num_sge; i++) > + recv_buffer_len += qp->resp.wqe->dma.sge[i].length; > + if (payload + 40 > recv_buffer_len) { > + rxe_dbg_qp(qp, "The receive buffer is too small for this UD packet.\n"); > + return RESPST_ERR_LENGTH; > + } > + } > + > if (pkt->mask & RXE_PAYLOAD_MASK && ((qp_type(qp) == IB_QPT_RC) || > (qp_type(qp) == IB_QPT_UC))) { > unsigned int mtu = qp->mtu;
On 23.05.24 14:06, Zhu Yanjun wrote: > > On 23.05.24 11:46, Honggang LI wrote: >> According to the IBA specification: >> If a UD request packet is detected with an invalid length, the request >> shall be an invalid request and it shall be silently dropped by >> the responder. The responder then waits for a new request packet. >> >> commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length >> checking") >> defers responder length check for UD QPs in function `copy_data`. >> But it introduces a regression issue for UD QPs. >> >> When the packet size is too large to fit in the receive buffer. >> `copy_data` will return error code -EINVAL. Then `send_data_in` >> will return RESPST_ERR_MALFORMED_WQE. UD QP will transfer into >> ERROR state. >> >> Fixes: 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length >> checking") >> Signed-off-by: Honggang LI <honggangli@163.com> >> --- >> drivers/infiniband/sw/rxe/rxe_resp.c | 12 ++++++++++++ >> 1 file changed, 12 insertions(+) >> >> diff --git a/drivers/infiniband/sw/rxe/rxe_resp.c >> b/drivers/infiniband/sw/rxe/rxe_resp.c >> index 963382f625d7..a74f29dcfdc9 100644 >> --- a/drivers/infiniband/sw/rxe/rxe_resp.c >> +++ b/drivers/infiniband/sw/rxe/rxe_resp.c >> @@ -354,6 +354,18 @@ static enum resp_states >> rxe_resp_check_length(struct rxe_qp *qp, >> * receive buffer later. For rmda operations additional >> * length checks are performed in check_rkey. >> */ >> + if ((qp_type(qp) == IB_QPT_GSI) || (qp_type(qp) == IB_QPT_UD)) { > > From IBA specification: > > " > > QP1, used for the General Services Interface (GSI). > •This QP uses the Unreliable Datagram transport service. > •All traffic to and from this QP uses any VL other than VL15. > •GSI packets arriving before the current packet’s command completes > may be dropped (i.e. the minimum queue depth of QP1 is one). > > " > > GSI should be MAD packets. And it should have a fixed format. Not sure > if the payload of GSI packets will exceed the size of the recv buffer. Sorry. My bad. From IBA specification: " C13-3: The data payload (as used in Chapter 9: Transport Layer on page 233) for all MADs shall be exactly 256 bytes. " Zhu Yanjun > > Except the above, I am fine with this commit. Please Jason and Leon > also comment on it. > > Reviewed-by: Zhu Yanjun <yanjun.zhu@linux.dev> > > Thanks, > > Zhu Yanjun > >> + unsigned int recv_buffer_len = 0; >> + unsigned int payload = payload_size(pkt); >> + >> + for (int i = 0; i < qp->resp.wqe->dma.num_sge; i++) >> + recv_buffer_len += qp->resp.wqe->dma.sge[i].length; >> + if (payload + 40 > recv_buffer_len) { >> + rxe_dbg_qp(qp, "The receive buffer is too small for this >> UD packet.\n"); >> + return RESPST_ERR_LENGTH; >> + } >> + } >> + >> if (pkt->mask & RXE_PAYLOAD_MASK && ((qp_type(qp) == IB_QPT_RC) || >> (qp_type(qp) == IB_QPT_UC))) { >> unsigned int mtu = qp->mtu; >
On Thu, May 23, 2024 at 05:03:12PM +0200, Zhu Yanjun wrote: > Subject: Re: [PATCH] RDMA/rxe: Fix responder length checking for UD request > packets > From: Zhu Yanjun <yanjun.zhu@linux.dev> > Date: Thu, 23 May 2024 17:03:12 +0200 > > > On 23.05.24 14:06, Zhu Yanjun wrote: > > > > On 23.05.24 11:46, Honggang LI wrote: > > > According to the IBA specification: > > > If a UD request packet is detected with an invalid length, the request > > > shall be an invalid request and it shall be silently dropped by > > > the responder. The responder then waits for a new request packet. > > > > > > commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length > > > checking") > > > defers responder length check for UD QPs in function `copy_data`. > > > But it introduces a regression issue for UD QPs. > > > > > > When the packet size is too large to fit in the receive buffer. > > > `copy_data` will return error code -EINVAL. Then `send_data_in` > > > will return RESPST_ERR_MALFORMED_WQE. UD QP will transfer into > > > ERROR state. > > > > > > Fixes: 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length > > > checking") > > > Signed-off-by: Honggang LI <honggangli@163.com> > > > --- > > > drivers/infiniband/sw/rxe/rxe_resp.c | 12 ++++++++++++ > > > 1 file changed, 12 insertions(+) > > > > > > diff --git a/drivers/infiniband/sw/rxe/rxe_resp.c > > > b/drivers/infiniband/sw/rxe/rxe_resp.c > > > index 963382f625d7..a74f29dcfdc9 100644 > > > --- a/drivers/infiniband/sw/rxe/rxe_resp.c > > > +++ b/drivers/infiniband/sw/rxe/rxe_resp.c > > > @@ -354,6 +354,18 @@ static enum resp_states > > > rxe_resp_check_length(struct rxe_qp *qp, > > > * receive buffer later. For rmda operations additional > > > * length checks are performed in check_rkey. > > > */ > > > + if ((qp_type(qp) == IB_QPT_GSI) || (qp_type(qp) == IB_QPT_UD)) { > > > > From IBA specification: > > > > " > > > > QP1, used for the General Services Interface (GSI). > > •This QP uses the Unreliable Datagram transport service. > > •All traffic to and from this QP uses any VL other than VL15. > > •GSI packets arriving before the current packet’s command completes may > > be dropped (i.e. the minimum queue depth of QP1 is one). > > > > " > > > > GSI should be MAD packets. And it should have a fixed format. Not sure > > if the payload of GSI packets will exceed the size of the recv buffer. It's dangerous to trust remote GSI request packets always fit in local receive buffer. A well-designed hostile GSI request packet can render remote QP1 into ERROR state. That means the remote node can't establish new RC QP connections. Thanks
On 24.05.24 03:52, Honggang LI wrote: > On Thu, May 23, 2024 at 05:03:12PM +0200, Zhu Yanjun wrote: >> Subject: Re: [PATCH] RDMA/rxe: Fix responder length checking for UD request >> packets >> From: Zhu Yanjun <yanjun.zhu@linux.dev> >> Date: Thu, 23 May 2024 17:03:12 +0200 >> >> >> On 23.05.24 14:06, Zhu Yanjun wrote: >>> >>> On 23.05.24 11:46, Honggang LI wrote: >>>> According to the IBA specification: >>>> If a UD request packet is detected with an invalid length, the request >>>> shall be an invalid request and it shall be silently dropped by >>>> the responder. The responder then waits for a new request packet. >>>> >>>> commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length >>>> checking") >>>> defers responder length check for UD QPs in function `copy_data`. >>>> But it introduces a regression issue for UD QPs. >>>> >>>> When the packet size is too large to fit in the receive buffer. >>>> `copy_data` will return error code -EINVAL. Then `send_data_in` >>>> will return RESPST_ERR_MALFORMED_WQE. UD QP will transfer into >>>> ERROR state. >>>> >>>> Fixes: 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length >>>> checking") >>>> Signed-off-by: Honggang LI <honggangli@163.com> >>>> --- >>>> drivers/infiniband/sw/rxe/rxe_resp.c | 12 ++++++++++++ >>>> 1 file changed, 12 insertions(+) >>>> >>>> diff --git a/drivers/infiniband/sw/rxe/rxe_resp.c >>>> b/drivers/infiniband/sw/rxe/rxe_resp.c >>>> index 963382f625d7..a74f29dcfdc9 100644 >>>> --- a/drivers/infiniband/sw/rxe/rxe_resp.c >>>> +++ b/drivers/infiniband/sw/rxe/rxe_resp.c >>>> @@ -354,6 +354,18 @@ static enum resp_states >>>> rxe_resp_check_length(struct rxe_qp *qp, >>>> * receive buffer later. For rmda operations additional >>>> * length checks are performed in check_rkey. >>>> */ >>>> + if ((qp_type(qp) == IB_QPT_GSI) || (qp_type(qp) == IB_QPT_UD)) { >>> >>> From IBA specification: >>> >>> " >>> >>> QP1, used for the General Services Interface (GSI). >>> •This QP uses the Unreliable Datagram transport service. >>> •All traffic to and from this QP uses any VL other than VL15. >>> •GSI packets arriving before the current packet’s command completes may >>> be dropped (i.e. the minimum queue depth of QP1 is one). >>> >>> " >>> >>> GSI should be MAD packets. And it should have a fixed format. Not sure >>> if the payload of GSI packets will exceed the size of the recv buffer. > > It's dangerous to trust remote GSI request packets always fit in local > receive buffer. A well-designed hostile GSI request packet can render > remote QP1 into ERROR state. That means the remote node can't establish > new RC QP connections. Thanks, Honggang. Based on our discussion, this seems to be a security problem. It seems that this problem is related with MLX5. Before MLX5 engineers jump into this problem, to RXE, this commit can avoid RXE hang in ERROR state. LGTM. Zhu Yanjun > > Thanks >
On Tue, May 28, 2024 at 01:10:00PM +0200, Zhu Yanjun wrote: > On 24.05.24 03:52, Honggang LI wrote: > > On Thu, May 23, 2024 at 05:03:12PM +0200, Zhu Yanjun wrote: > > > Subject: Re: [PATCH] RDMA/rxe: Fix responder length checking for UD request > > > packets > > > From: Zhu Yanjun <yanjun.zhu@linux.dev> > > > Date: Thu, 23 May 2024 17:03:12 +0200 > > > > > > > > > On 23.05.24 14:06, Zhu Yanjun wrote: > > > > > > > > On 23.05.24 11:46, Honggang LI wrote: > > > > > According to the IBA specification: > > > > > If a UD request packet is detected with an invalid length, the request > > > > > shall be an invalid request and it shall be silently dropped by > > > > > the responder. The responder then waits for a new request packet. > > > > > > > > > > commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length > > > > > checking") > > > > > defers responder length check for UD QPs in function `copy_data`. > > > > > But it introduces a regression issue for UD QPs. > > > > > > > > > > When the packet size is too large to fit in the receive buffer. > > > > > `copy_data` will return error code -EINVAL. Then `send_data_in` > > > > > will return RESPST_ERR_MALFORMED_WQE. UD QP will transfer into > > > > > ERROR state. > > > > > > > > > > Fixes: 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length > > > > > checking") > > > > > Signed-off-by: Honggang LI <honggangli@163.com> > > > > > --- > > > > > drivers/infiniband/sw/rxe/rxe_resp.c | 12 ++++++++++++ > > > > > 1 file changed, 12 insertions(+) > > > > > > > > > > diff --git a/drivers/infiniband/sw/rxe/rxe_resp.c > > > > > b/drivers/infiniband/sw/rxe/rxe_resp.c > > > > > index 963382f625d7..a74f29dcfdc9 100644 > > > > > --- a/drivers/infiniband/sw/rxe/rxe_resp.c > > > > > +++ b/drivers/infiniband/sw/rxe/rxe_resp.c > > > > > @@ -354,6 +354,18 @@ static enum resp_states > > > > > rxe_resp_check_length(struct rxe_qp *qp, > > > > > * receive buffer later. For rmda operations additional > > > > > * length checks are performed in check_rkey. > > > > > */ > > > > > + if ((qp_type(qp) == IB_QPT_GSI) || (qp_type(qp) == IB_QPT_UD)) { > > > > > > > > From IBA specification: > > > > > > > > " > > > > > > > > QP1, used for the General Services Interface (GSI). > > > > •This QP uses the Unreliable Datagram transport service. > > > > •All traffic to and from this QP uses any VL other than VL15. > > > > •GSI packets arriving before the current packet’s command completes may > > > > be dropped (i.e. the minimum queue depth of QP1 is one). > > > > > > > > " > > > > > > > > GSI should be MAD packets. And it should have a fixed format. Not sure > > > > if the payload of GSI packets will exceed the size of the recv buffer. > > > > It's dangerous to trust remote GSI request packets always fit in local > > receive buffer. A well-designed hostile GSI request packet can render > > remote QP1 into ERROR state. That means the remote node can't establish > > new RC QP connections. > > Thanks, Honggang. > Based on our discussion, this seems to be a security problem. It seems that > this problem is related with MLX5. Before MLX5 engineers jump into this > problem, to RXE, this commit can avoid RXE hang in ERROR state. Current RDMA network is designed with assumption that all participants are trusted. Thanks > > LGTM. > > Zhu Yanjun > > > > > Thanks > > >
On Thu, 23 May 2024 17:46:17 +0800, Honggang LI wrote: > According to the IBA specification: > If a UD request packet is detected with an invalid length, the request > shall be an invalid request and it shall be silently dropped by > the responder. The responder then waits for a new request packet. > > commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking") > defers responder length check for UD QPs in function `copy_data`. > But it introduces a regression issue for UD QPs. > > [...] Applied, thanks! [1/1] RDMA/rxe: Fix responder length checking for UD request packets https://git.kernel.org/rdma/rdma/c/05301cb42a5567 Best regards,
On 30.05.24 16:17, Leon Romanovsky wrote: > On Thu, 23 May 2024 17:46:17 +0800, Honggang LI wrote: >> According to the IBA specification: >> If a UD request packet is detected with an invalid length, the request >> shall be an invalid request and it shall be silently dropped by >> the responder. The responder then waits for a new request packet. >> >> commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking") >> defers responder length check for UD QPs in function `copy_data`. >> But it introduces a regression issue for UD QPs. >> >> [...] > Applied, thanks! > > [1/1] RDMA/rxe: Fix responder length checking for UD request packets > https://git.kernel.org/rdma/rdma/c/05301cb42a5567 Hi, Leon When I built this commit with gcc (Debian 8.3.0-6) 8.3.0, the following warnings will pop out. " drivers/infiniband/sw/rxe/rxe_resp.c: In function ‘rxe_resp_check_length’: drivers/infiniband/sw/rxe/rxe_resp.c:401:3: error: ‘for’ loop initial declarations are only allowed in C99 or C11 mode for (int i = 0; i < qp->resp.wqe->dma.num_sge; i++) ^~~ drivers/infiniband/sw/rxe/rxe_resp.c:401:3: note: use option -std=c99, -std=gnu99, -std=c11 or -std=gnu11 to compile your code " The following diff will fix this problem. " diff --git a/drivers/infiniband/sw/rxe/rxe_resp.c b/drivers/infiniband/sw/rxe/rxe_resp.c index ad3c7bf76752..6596a85723c9 100644 --- a/drivers/infiniband/sw/rxe/rxe_resp.c +++ b/drivers/infiniband/sw/rxe/rxe_resp.c @@ -345,10 +345,11 @@ static enum resp_states rxe_resp_check_length(struct rxe_qp *qp, * length checks are performed in check_rkey. */ if ((qp_type(qp) == IB_QPT_GSI) || (qp_type(qp) == IB_QPT_UD)) { - unsigned int recv_buffer_len = 0; unsigned int payload = payload_size(pkt); + unsigned int recv_buffer_len = 0; + int i; - for (int i = 0; i < qp->resp.wqe->dma.num_sge; i++) + for (i = 0; i < qp->resp.wqe->dma.num_sge; i++) recv_buffer_len += qp->resp.wqe->dma.sge[i].length; if (payload + 40 > recv_buffer_len) { rxe_dbg_qp(qp, "The receive buffer is too small for this UD packet.\n"); " Zhu Yanjun > > Best regards,
On Fri, Jun 07, 2024 at 10:57:12AM +0200, Zhu Yanjun wrote: > > On 30.05.24 16:17, Leon Romanovsky wrote: > > On Thu, 23 May 2024 17:46:17 +0800, Honggang LI wrote: > > > According to the IBA specification: > > > If a UD request packet is detected with an invalid length, the request > > > shall be an invalid request and it shall be silently dropped by > > > the responder. The responder then waits for a new request packet. > > > > > > commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking") > > > defers responder length check for UD QPs in function `copy_data`. > > > But it introduces a regression issue for UD QPs. > > > > > > [...] > > Applied, thanks! > > > > [1/1] RDMA/rxe: Fix responder length checking for UD request packets > > https://git.kernel.org/rdma/rdma/c/05301cb42a5567 > > Hi, Leon > > When I built this commit with gcc (Debian 8.3.0-6) 8.3.0, the following > warnings will pop out. Thanks, I fixed it in my tree. > > " > drivers/infiniband/sw/rxe/rxe_resp.c: In function ‘rxe_resp_check_length’: > drivers/infiniband/sw/rxe/rxe_resp.c:401:3: error: ‘for’ loop initial > declarations are only allowed in C99 or C11 mode > for (int i = 0; i < qp->resp.wqe->dma.num_sge; i++) > ^~~ > drivers/infiniband/sw/rxe/rxe_resp.c:401:3: note: use option -std=c99, > -std=gnu99, -std=c11 or -std=gnu11 to compile your code > " > > The following diff will fix this problem. > > " > > diff --git a/drivers/infiniband/sw/rxe/rxe_resp.c > b/drivers/infiniband/sw/rxe/rxe_resp.c > index ad3c7bf76752..6596a85723c9 100644 > --- a/drivers/infiniband/sw/rxe/rxe_resp.c > +++ b/drivers/infiniband/sw/rxe/rxe_resp.c > @@ -345,10 +345,11 @@ static enum resp_states rxe_resp_check_length(struct > rxe_qp *qp, > * length checks are performed in check_rkey. > */ > if ((qp_type(qp) == IB_QPT_GSI) || (qp_type(qp) == IB_QPT_UD)) { > - unsigned int recv_buffer_len = 0; > unsigned int payload = payload_size(pkt); > + unsigned int recv_buffer_len = 0; > + int i; > > - for (int i = 0; i < qp->resp.wqe->dma.num_sge; i++) > + for (i = 0; i < qp->resp.wqe->dma.num_sge; i++) > recv_buffer_len += qp->resp.wqe->dma.sge[i].length; > if (payload + 40 > recv_buffer_len) { > rxe_dbg_qp(qp, "The receive buffer is too small for > this UD packet.\n"); > > " > > Zhu Yanjun > > > > > Best regards, > > -- > Best Regards, > Yanjun.Zhu >
diff --git a/drivers/infiniband/sw/rxe/rxe_resp.c b/drivers/infiniband/sw/rxe/rxe_resp.c index 963382f625d7..a74f29dcfdc9 100644 --- a/drivers/infiniband/sw/rxe/rxe_resp.c +++ b/drivers/infiniband/sw/rxe/rxe_resp.c @@ -354,6 +354,18 @@ static enum resp_states rxe_resp_check_length(struct rxe_qp *qp, * receive buffer later. For rmda operations additional * length checks are performed in check_rkey. */ + if ((qp_type(qp) == IB_QPT_GSI) || (qp_type(qp) == IB_QPT_UD)) { + unsigned int recv_buffer_len = 0; + unsigned int payload = payload_size(pkt); + + for (int i = 0; i < qp->resp.wqe->dma.num_sge; i++) + recv_buffer_len += qp->resp.wqe->dma.sge[i].length; + if (payload + 40 > recv_buffer_len) { + rxe_dbg_qp(qp, "The receive buffer is too small for this UD packet.\n"); + return RESPST_ERR_LENGTH; + } + } + if (pkt->mask & RXE_PAYLOAD_MASK && ((qp_type(qp) == IB_QPT_RC) || (qp_type(qp) == IB_QPT_UC))) { unsigned int mtu = qp->mtu;
According to the IBA specification: If a UD request packet is detected with an invalid length, the request shall be an invalid request and it shall be silently dropped by the responder. The responder then waits for a new request packet. commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking") defers responder length check for UD QPs in function `copy_data`. But it introduces a regression issue for UD QPs. When the packet size is too large to fit in the receive buffer. `copy_data` will return error code -EINVAL. Then `send_data_in` will return RESPST_ERR_MALFORMED_WQE. UD QP will transfer into ERROR state. Fixes: 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking") Signed-off-by: Honggang LI <honggangli@163.com> --- drivers/infiniband/sw/rxe/rxe_resp.c | 12 ++++++++++++ 1 file changed, 12 insertions(+)